/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.h | 41 u8 key_signature[16]; /* HMAC-MD5 message integrity check computed with member in struct:ieee802_1x_eapol_key
|
ieee802_1x.c | 220 key->key_signature); [all...] |
/external/wpa_supplicant/ |
eapol_sm.c | 173 u8 key_signature[IEEE8021X_KEY_SIGN_LEN]; member in struct:ieee802_1x_eapol_key 694 os_memcpy(orig_key_sign, key->key_signature, IEEE8021X_KEY_SIGN_LEN); 695 os_memset(key->key_signature, 0, IEEE8021X_KEY_SIGN_LEN); 698 key->key_signature); 699 if (os_memcmp(orig_key_sign, key->key_signature, 703 os_memcpy(key->key_signature, orig_key_sign, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/eapol_supp/ |
eapol_supp_sm.c | 173 u8 key_signature[IEEE8021X_KEY_SIGN_LEN]; member in struct:ieee802_1x_eapol_key 719 os_memcpy(orig_key_sign, key->key_signature, IEEE8021X_KEY_SIGN_LEN); 720 os_memset(key->key_signature, 0, IEEE8021X_KEY_SIGN_LEN); 723 key->key_signature); 724 if (os_memcmp(orig_key_sign, key->key_signature, 728 os_memcpy(key->key_signature, orig_key_sign, [all...] |
/external/wpa_supplicant_8/src/eapol_supp/ |
eapol_supp_sm.c | 173 u8 key_signature[IEEE8021X_KEY_SIGN_LEN]; member in struct:ieee802_1x_eapol_key 727 os_memcpy(orig_key_sign, key->key_signature, IEEE8021X_KEY_SIGN_LEN); 728 os_memset(key->key_signature, 0, IEEE8021X_KEY_SIGN_LEN); 731 key->key_signature); 732 if (os_memcmp(orig_key_sign, key->key_signature, 736 os_memcpy(key->key_signature, orig_key_sign, [all...] |